Resource Access Control Facility
This article needs additional citations for verification. (August 2012) |
RACF [pronounced Rack-Eff], short for Resource Access Control Facility, is an IBM software product. It is a security system that provides access control and auditing functionality for the z/OS and z/VM operating systems. RACF was introduced in 1976.[1] Originally called RACF it was renamed to z/OS Security Server (RACF), although most mainframe folks[who?] still refer to it as RACF.[2]
Its main features are:[1]
- Identification and verification of a user via user id and password check (authentication)
- Identification, classification and protection of system resources
- Maintenance of access rights to the protected resources (access control)
- Controlling the means of access to protected resources
- Logging of accesses to a protected system and protected resources (auditing)
RACF establishes security policies rather than just permission records. It can set permissions for file patterns—that is, set the permissions even for files that do not yet exist. Those permissions are then used for the file (or other object) created at a later time.[3]
Community
[edit]There is a long established technical support community for RACF based around a LISTSERV operated out of the University of Georgia. The list is called RACF-L which is described as RACF Discussion List. The email address of the listserv is RACF-L@LISTSERV.UGA.EDU and can also be viewed via a webportal at https://listserv.uga.edu/scripts/wa-UGA.exe .[4][5]
Books
[edit]The first text book published (first printing December 2007) aimed at giving security professionals an introduction to the concepts and conventions of how RACF is designed and administered was Mainframe Basics for Security Professionals: Getting Started with RACF by Ori Pomerantz, Barbara Vander Weele, Mark Nelson, and Tim Hahn.[3]
Evolution
[edit]RACF has continuously evolved[6] to support such modern security features as digital certificates/public key infrastructure services, LDAP interfaces, and case sensitive IDs/passwords. The latter is a reluctant concession to promote interoperability with other systems, such as Unix and Linux. The underlying zSeries (now IBM Z) hardware works closely with RACF. For example, digital certificates are protected within tamper-proof cryptographic processors. Major mainframe subsystems, especially Db2, use RACF to provide multi-level security (MLS).
Its primary competitors have been ACF2 and TopSecret, both now produced by CA Technologies.[7]
References
[edit]- ^ a b "IBM RACF". IBM. Retrieved August 17, 2012.
- ^ "z/OS Security Server (RACF)". www.ibm.com. 2015-07-02. Retrieved 2021-08-06.
- ^ a b Ori Pomerantz (2008). Mainframe basics for security professionals: getting started with RACF. Upper Saddle River, NJ: IBM Press. ISBN 978-0-13-173856-0. OCLC 213380831.
- ^ "Internet sources". www.ibm.com. 2013-09-28. Retrieved 2021-08-06.
- ^ "LISTSERV - LISTSERV Archives - LISTSERV.UGA.EDU". listserv.uga.edu. Retrieved 2021-08-06.
- ^ "IBM RACF - The History of RACF". Archived from the original on August 6, 2011. Retrieved August 17, 2012.
- ^ Jeffrey Yost, "The Origin and Early History of the Computer Security Software Products Industry," IEEE Annals of the History of Computing 37 no. 2 (2015): 46-58 doi
External links
[edit]